skip to main content
10.1145/1095714.1095803acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
Article

Distributed computing and computer security education

Published: 20 October 2005 Publication History

Abstract

This paper presents our experience in using cluster computing when teaching Computer and Data Security. The background knowledge together with the topics that fit the best applications of distributed computing and the hardware and software needs are discussed. Several project activities are presented with some analyzed in detail. The first requires the students to develop a computer cluster out of a regular public lab and use it for building security attacks such as password and encryption key cracking. The second deals with prime number generation using a client /server architecture (implemented in Java) and an Oracle database complemented by the implementation of resiliency (reassigning jobs when a node dies). These projects allow the implementation of real world - like attacks while using relatively inexpensive resources. Based on class assessment, they were highly appreciated by the students, increasing their awareness on the power of distributed computing with respect to data security and ensuring their preparedness to further advances in computing.

References

[1]
Yang, T. A., Yue, K-B., Liaw, M., Collins, G., Venkatraman, J., T., Achar, S., Sadasivam, K., and Chen P., Design of a distributed computer security lab. Journal of Computing in Colleges, vol 20, no 1, 2004, 332--346.
[2]
Georgiev, I. K., and Georgiev I.I., A security model for distributed computing, Journal of Computing in Colleges, vol 17, no 1, 2001, 178--186.
[3]
Pfleeger, C.,S. Pfleeger, Security in Computing, Prentice Hall, 2003
[4]
Stallings, W., Network Security Essentials, 2nd Ed., Prentice Hall, 2003
[5]
Null, L., Integrating security across the computer science curriculum, Journal of Computing in Colleges, vol 19, no 5, 2001, 170--178.
[6]
Treese, W., How to build a supercomputer, netWorker, vol 8, no 4, 2004, pp 15--18.
[7]
Shade, E., Ready for prime time?, Journal of Computing in Colleges, vol 17, no 3, 2002, 282--289.
[8]
Scambray,J., McClure,S., and Kurtz, G. Hacking Exposed, 4th Ed, McGraw-Hill Professional Publishing, 2003
[9]
Botting, R., Teaching and learning ethics in computer science: walking the walk, Proceedings SIGCSE, 2005, pp. 342--346.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGITE '05: Proceedings of the 6th conference on Information technology education
October 2005
402 pages
ISBN:1595932526
DOI:10.1145/1095714
  • General Chair:
  • Rob Friedman

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 October 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. class projects
  2. inexpensive computing
  3. passwords
  4. prime numbers

Qualifiers

  • Article

Conference

SIGITE05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 176 of 429 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 478
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media